{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T04:06:24Z","timestamp":1649045184195},"reference-count":21,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[1998,7,1]],"date-time":"1998-07-01T00:00:00Z","timestamp":899251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,7]]},"DOI":"10.1016\/s0140-3664(98)00152-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:03:07Z","timestamp":1027623787000},"page":"867-879","source":"Crossref","is-referenced-by-count":2,"title":["The impact of routing on multicast error recovery"],"prefix":"10.1016","volume":"21","author":[{"given":"J\u00f6rg","family":"Nonnenmacher","sequence":"first","affiliation":[]},{"given":"Ernst W.","family":"Biersack","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/S0140-3664(98)00152-2_BIB1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/179606.179627","article-title":"MBONE: the multicast backbone","volume":"37","author":"Eriksson","year":"1994","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB2","series-title":"Proceedings of IEEE Global Internet","article-title":"Packet loss correlation in the mbone multicast network","author":"Yajnik","year":"1996"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB3","first-page":"602","article-title":"Effect of topology on performance of reliable multicast communication","volume":"Vol. 2","author":"Bhagwat","year":"1994"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB4","doi-asserted-by":"crossref","unstructured":"S. Floyd, V. Jacobson, C. Liu, S. McCanne, L. Zhang, A reliable multicast framework for light-weight sessions and application level framing, submitted to IEEE\/ACM Transactions on Networking.","DOI":"10.1145\/217382.217470"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB5","series-title":"Proceedings of ICCCN'94","article-title":"The trade-offs of multicast trees and algorithms","author":"Wei","year":"1994"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB6","first-page":"82","article-title":"How bad is na\u00efve multi\u0107ast routing","volume":"Vol. 1","author":"Doar","year":"1993"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB7","series-title":"Proceedings of IEEE INFOCOM'92","first-page":"2078","article-title":"Multicasting for multimedia applications","author":"Kompella","year":"1992"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB8","series-title":"Proceedings of IEEE ITS'94","article-title":"Evaluation of multicast routing algorithms for multimedia streams","author":"Noronha","year":"1994"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB9","article-title":"The design and evaluation of routing algorithms or real-time channels","author":"Widyono","year":"1994"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB10","first-page":"85","article-title":"Performance and resource cost comparisons for the cbt and pim multicast routing protocols in dis environments","volume":"Vol. 1","author":"Billhartz","year":"1996"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB11","series-title":"Proceedings of IEEE INFOCOM'87","first-page":"521","article-title":"A selective repeat arq protocol for a point to multipoint channel","author":"Towsley","year":"1987"},{"issue":"3","key":"10.1016\/S0140-3664(98)00152-2_BIB12","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/TCOM.1985.1096290","article-title":"An analysis of a point-to-multipoint channel using a go-back-n error control protocol","volume":"33","author":"Towsley","year":"1985","journal-title":"IEEE Transactions on Communications"},{"issue":"9","key":"10.1016\/S0140-3664(98)00152-2_BIB13","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1109\/26.237857","article-title":"Hybrid arq schemes for point-to-multipoint communication over nonstationary broadcast channels","volume":"41","author":"Deng","year":"1993","journal-title":"IEEE Transactions on Communications"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB14","series-title":"Proceedings of IEEE INFOCOM'87","first-page":"512","article-title":"Resequencing delay and buffer occupancy in selective repeat arq with multiple receivers","author":"Shacham","year":"1987"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB15","series-title":"Proceedings of ACM Sigmetrics","first-page":"221","article-title":"A comparison of sender-initiated and receiver-initiated reliable multicast protocols","author":"Pingali","year":"1994"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/BF00288961","article-title":"A fast algorithm for steiner trees","volume":"15","author":"Kou","year":"1981","journal-title":"Acta Informatica"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1002\/net.3230170203","article-title":"Steiner problem in networks: a survey","volume":"17","author":"Winter","year":"1987","journal-title":"Networks"},{"issue":"9","key":"10.1016\/S0140-3664(98)00152-2_BIB18","first-page":"1617","article-title":"Routing of multipoint connections","volume":"6","author":"Waxman","year":"1988","journal-title":"IEEE JSAC"},{"issue":"3","key":"10.1016\/S0140-3664(98)00152-2_BIB19","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/193285.193296","article-title":"Minimising packet copies in multicast routing by exploiting geographic spread","volume":"24","author":"Kadirire","year":"1994","journal-title":"ACM Computer Communication Review"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB20","series-title":"Proceedings of IFIP 5th International Workshop on Protocols for High Speed Networks (PfHSN'96), INRIA","article-title":"Reliable multicast: where to use fec","author":"Nonnenmacher","year":"1996"},{"key":"10.1016\/S0140-3664(98)00152-2_BIB21","article-title":"Resource sharing in multicast connections","author":"Nonnenmacher","year":"1996"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498001522?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498001522?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T03:20:39Z","timestamp":1555989639000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498001522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,7]]},"references-count":21,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1998,7]]}},"alternative-id":["S0140366498001522"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00152-2","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1998,7]]}}}